Tag: the hack report

Top Software Testing Services

Dark-Web Website Connected With The Netwalker Ransomware, Seized By Authorities

Authorities from the US and Bulgaria recently seized a dark web website which was utilized by the cybercrime group behind the Netwalker ransomware to distribute and sell the stolen/breached data. Nicholas L. McQuaid, the Acting Assistant Attorney General at the Criminal division of the Justice Department explained that “ransomware victims should know that coming forward…
Read more

New Family Of Credential Stealing Android Malware, Forewarns Italy CERT

Researchers recently unveiled a new family of credential stealing Android malware which exploits the Androids accessibility service to capture video and audio of activities going on the device display and steal credentials of the user. The malware was first found by the AddressIntel and was named Oscorp by Italy’s CERT-AGID. Researchers highlighted, “it should be…
Read more

Kaspersky Explains That Organizations In Africa Should Be More Alert And Better To Battle Cyber Attacks

Alerting your boss that your organization’s PC has been phished, survivors of a mission to acquire delicate data through false emails should be viewed as a corporate win rather than viewing it as a peril to your work. That is the adjustment in culture required at African organizations as cybersecurity threats thrive on the rear…
Read more

A Severe Gap Filled By Threat Hunting

Threat hunting is a practice or act of searching for cyber threats that may have slipped into your networks. It is a severe discipline that, nowadays, more and more organizations are utilizing to destroy hidden espionage campaigns/attacks prior to letting them breach data or perform malicious operations. Since threat hunting utilizes human knowledge and experience…
Read more

Researchers Discovered Hacking Of Azure Functions And Escaping Docker

Paul Litvak, a cybersecurity researcher at Interzer Lab, recently revealed an unfixed vulnerability in Microsoft Azure Functions that could be utilized by an aggressor to elevate rights and escape from the Docker container that is utilized for facilitating them (privileges). The discovery of the vulnerability occurred during the Intezer Lab’s examinations concerning the Azure compute…
Read more

Any Unprivileged User Can Gain Root Privileges On A Linux System Using A Default Sudo Configuration

The research team of Qualys, recently found a vulnerability in sudo, dubbed as the heap overflow vulnerability. Sudo is an omnipresent and powerful open-source utility that is mainly utilized on operating systems like Unix and Linux. This vulnerability has been registered as CVE-2021-3156. Exploiting this vulnerability can allow any unauthorized user, without any permissions, to…
Read more

Iranian Whatsapp Users Migrate To Signal, Government Blocks It

The government of Iran has now blocked the trendy messaging app “Signal”, right after users migrate to it from Whatsapp. Much the same as the residents of different nations, Iranians too downloaded Signal after security/privacy worries with Facebook and WhatsApp peaked. Clients across the world shifted to Signal and Telegram in reaction to WhatsApp’s new…
Read more

Use SMTP TLS Reporting And MTA-STS To Intensify Your Email Security

When SMTP was first determined, in 1982, it didn’t contain any component for giving security at the transmission level to ensure the safety of interchanges between mail transfer agents. The STARTTLS command was introduced to SMTP in 1999, which thus upheld the encryption of emails in the middle of the servers, giving the capacity to…
Read more

C-Suites Suffer Targeted Phishing Attacks

High-ranking company executives, generally known as C-Suites, from industries of real estate, government, finance, technology, and manufacturing are being widely targeted by specific developing phishing scam/operation which is under observation from around May 2020. This phishing scam involves a social engineering method/trick in which, the cybercriminals send fake emails to their targeted C-suites, claiming that…
Read more

Exploited In The Wild, 3 iOS Zero-Day Vulnerabilities Revealed By Apple

Updates of iOS, iPadOs, and tvOS have been released by Apple, on Tuesday, which includes patches/fixes for three vulnerabilities, that Apple believes, which could have been exploited in the wild quite often. The three vulnerabilities have been registered, as CVE-2021-1782, CVE-2021-1870, and CVE-2021-1871, and were capable of serving a hacker/attacker to escalate privileges and gain…
Read more